scispace - formally typeset
Search or ask a question
Topic

Database encryption

About: Database encryption is a research topic. Over the lifetime, 320 publications have been published within this topic receiving 10685 citations.


Papers
More filters
Book ChapterDOI
01 Aug 2020
TL;DR: This paper presents a review of Order Preserving Encryption schemes (OPES) a technique for database encryption which execute range queries in an efficient manner, the existing approaches of database encryption techniques using OPE, Principles, and Application of O PE, various types of Attack on OPE and overview of Mutable order PreservingEncoding mOPE.
Abstract: Cloud computing and Database as a service have gaining rapid interest by many organizations today because of its cost effectiveness but it faced a lot of security issued in protecting client business sensitive data, the traditional encryption techniques for database security cannot ensure that a database is safe for intrusion, unauthorized access and queries processes over encrypted data in the present technological evolution. This paper presents a review of Order Preserving Encryption schemes (OPES) a technique for database encryption which execute range queries in an efficient manner, the existing approaches of database encryption techniques using OPE, Principles, and Application of OPE, various types of Attack on OPE and overview of Mutable order Preserving Encoding mOPE.

1 citations

22 Dec 2014
TL;DR: An algorithm which encrypt and decrypt database over query fire quickly is observed, which will be simple and fast enough for most application which limits to the time and cost of encryption and decryption.
Abstract: As the Computer System becomes popular for storing personal and precious data, need of data security goes its peak. For transmitting confidential information over the network, security is required so that it could not be accessed by illegitimate user. The database contains large amount of data that need to be secure. Cryptographic algorithms provide a way to secure data against the unauthorized access. Encryption is the process of encoding data so that its meaning is not obvious, decryption is reverse process that transform an encrypted massage back into original form. Encryption in database system is an important aspect for research, as efficient and secure algorithms are needed that provide the ability to query over encrypted database and allow optimized encryption and decryption of data. In this paper we observe an algorithm which encrypt and decrypt database over query fire quickly. This proposed algorithm will be simple and fast enough for most application which limits to the time and cost of encryption and decryption.

1 citations

Proceedings ArticleDOI
19 Nov 2020
TL;DR: In the system test link comparing with the traditional database encryption and decryption system, it is verified that the designed system can effectively reduce the bit error rate and improve the database security.
Abstract: In view of the problem that the error rate is too high in the use of the original heterogeneous database encryption and decryption system, the original encryption and decryption system is optimized by data mining calculation, and the heterogeneous database encryption and decryption system based on data mining is designed. Through the data acquisition equipment, data storage equipment and system data transmission equipment to complete the hardware design of the system; according to the database user rights to design the database encryption dictionary, using data mining technology to complete the data preprocessing, using the form of homomorphic encryption to complete the encryption and decryption process of the database. At this point, the implementation of heterogeneous database encryption and decryption system design based on data mining. In the system test link comparing with the traditional database encryption and decryption system, by comparing the bit error rate, it is verified that the designed system can effectively reduce the bit error rate and improve the database security.

1 citations

Journal Article
Fang Yong1
TL;DR: The principle and advantages of the new independent one-time passwords scheme are analyzed, and the scheme is applied into the database encryption system to strenghen the security of identity distinguishment.
Abstract: According to serveral drawbacks of existing one-time passwords schemes, this paper analyses the principle and advantages of the new independent one-time passwords scheme, and apply it into the database encryption system to strenghen the security of identity distinguishment.

1 citations

Journal Article
TL;DR: Methods of database encryption and its characteristics are discussed, and the method of encryption algorithm like DES (Data Encryption Standard)--sub-key database encryption algorithm is introduced in detail; meanwhile, how to fulfill database encryption, database decryption, and database update is analyzed and discussed.
Abstract: Methods of database encryption and its characteristics are firstly discussed. Then the method of encryption algorithm like DES (Data Encryption Standard)--sub-key database encryption algorithm is introduced in detail; meanwhile, how to fulfill database encryption, database decryption, and database update is analyzed and discussed. Finally, Microsoft database-SQL (Structured Query Language) Server 2000 is taken as an example to illustrate the implementation procedure of database encryption algorithm. This example is widely used as reference in many fields, particularly in MIS (Management Information System) security and e-commerce.

1 citations


Network Information
Related Topics (5)
Encryption
98.3K papers, 1.4M citations
70% related
Authentication
74.7K papers, 867.1K citations
68% related
Wireless sensor network
142K papers, 2.4M citations
67% related
Mobile computing
51.3K papers, 1M citations
67% related
Cryptography
37.3K papers, 854.5K citations
66% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20214
202013
201923
201821
201718
201614